๐Ÿ” CVE Alert

CVE-2026-5339

MEDIUM 4.7

Tenda G103 Setting gpon.lua action_set_net_settings command injection

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was detected in Tenda G103 1.0.0.5. The impacted element is the function action_set_net_settings of the file gpon.lua of the component Setting Handler. Performing a manipulation of the argument authLoid/authLoidPassword/authPassword/authSerialNo/authType/oltType/usVlanId/usVlanPriority results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.

CWE CWE-77 CWE-74
Vendor tenda
Product g103
Published Apr 2, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for tenda g103

Be the first to know when new medium vulnerabilities affecting tenda g103 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Tenda / G103
1.0.0.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/354670 vuldb.com: https://vuldb.com/vuln/354670/cti vuldb.com: https://vuldb.com/submit/781132 vuldb.com: https://vuldb.com/submit/781133 vuldb.com: https://vuldb.com/submit/781134 vuldb.com: https://vuldb.com/submit/781135 vuldb.com: https://vuldb.com/submit/781142 vuldb.com: https://vuldb.com/submit/781143 vuldb.com: https://vuldb.com/submit/781144 vuldb.com: https://vuldb.com/submit/781145 github.com: https://github.com/ZZ2266/.github.io/tree/main/Tenda%20G103/authLoid tenda.com.cn: https://www.tenda.com.cn/

Credits

๐Ÿ” n0ps1ed (VulDB User)